Posts in Category

Function

Cyber Threat Intelligence
Detection, Isolation, and Negotiation: Improving Your Ransomware Preparedness and Response
The risks presented by ransomware and cyber extortion events have likely found a place in your own security ...
Read post
Current events
Killnet, Kaliningrad, and Lithuania’s Transport Standoff With Russia
Blogs Blog Killnet, Kaliningrad, and Lithuania’s Transport Standoff With Russia Russian cyber collective ...
Read post
Corporate & Physical Security
Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape 
Attacks on ATMs and other physical payment-related devices, like point-of-sale (POS) terminals, have long been ...
Read post
Vulnerability Management
Hackers Are Still Exploiting Log4Shell Vulnerability, Warns CISA
Yesterday, CISA and US Coast Guard Cyber Command (CGCYBER) warned that nation-state hackers are still exploiting ...
Read post
Vulnerability management
Patch Tuesday Isn’t Ending. Here’s What Microsoft is Saying
According to Microsoft, Patch Tuesday will continue in July 2022 and the foreseeable future. Unfortunately, ...
Read post
Current events
Biden Signs State and Local Government Cybersecurity Act Into Law; Establishes Rotational Cyber Workforce
Blogs Blog Biden Signs State and Local Government Cybersecurity Act Into Law; Establishes Rotational Cyber ...
Read post
Cyber Threat Intelligence
Why Every Business Should Have Threat Intelligence
Threat intelligence is an essential component to any organization’s risk-remediation and security program. ...
Read post
Product features
Protect Your Customer Base From Fraud and Account Takeover (ATO) With CCM-C
It’s imperative for organizations to have a plan for proactively preventing customer fraud and account takeover ...
Read post
Vulnerability Management
China is Exploiting Network Providers and Devices, Says US Cybersecurity Advisory
On June 7, the US Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), ...
Read post
Current events
US Seizes SSNDOB Market, Which Sold PII of 24 Million People
The DOJs takedown of SSNDOB is the latest in a series of seizures of illicit marketplaces, forums, and shops, ...
Read post
Cyber Threat Intelligence
After Hydra: Telegram, Cash-out Services, Decentralization, and a Slew of Struggling Alternatives
The fight between various marketplaces for their place under the sun demonstrates the significance of Hydra in ...
Read post
Vulnerability Management
The Practitioner’s Guide to Vulnerability Management: Implementing a Risk-Based Approach
A scalable, high-quality vulnerability management program (VMP) accounts for volatility and exploitability by ...
Read post